Not a member of Pastebin yet?
Sign Up,
it unlocks many cool features!
- Result of the command: "show interface ip bri"
- Interface IP-Address OK? Method Status Protocol
- GigabitEthernet0/0 unassigned YES unset up up
- GigabitEthernet0/0.1 10.1.1.254 YES CONFIG up up
- GigabitEthernet0/0.10 10.10.10.254 YES CONFIG up up
- GigabitEthernet0/0.20 20.20.20.254 YES CONFIG up up
- GigabitEthernet0/0.30 30.30.30.254 YES CONFIG up up
- GigabitEthernet0/1 unassigned YES unset administratively down down
- GigabitEthernet0/2 192.168.122.60 YES manual up up
- GigabitEthernet0/3 unassigned YES unset administratively down down
- GigabitEthernet0/4 unassigned YES unset administratively down down
- GigabitEthernet0/5 unassigned YES unset administratively down down
- GigabitEthernet0/6 unassigned YES unset administratively down down
- Management0/0 unassigned YES unset administratively down down
- Result of the command: "ping 10.1.1.1"
- Type escape sequence to abort.
- Sending 5, 100-byte ICMP Echos to 10.1.1.1, timeout is 2 seconds:
- ?????
- Success rate is 0 percent (0/5)
- Result of the command: "ping 10.10.10.1"
- Type escape sequence to abort.
- Sending 5, 100-byte ICMP Echos to 10.10.10.1, timeout is 2 seconds:
- !!!!!
- Success rate is 100 percent (5/5), round-trip min/avg/max = 1/6/10 ms
- Result of the command: "ping 20.20.20.1"
- Type escape sequence to abort.
- Sending 5, 100-byte ICMP Echos to 20.20.20.1, timeout is 2 seconds:
- !!!!!
- Success rate is 100 percent (5/5), round-trip min/avg/max = 1/6/10 ms
- Result of the command: "ping 30.30.30.1"
- Type escape sequence to abort.
- Sending 5, 100-byte ICMP Echos to 30.30.30.1, timeout is 2 seconds:
- !!!!!
- Success rate is 100 percent (5/5), round-trip min/avg/max = 1/4/10 ms
- : Saved
- :
- : Serial Number: 9ALCE6LEXX7
- : Hardware: ASAv, 2048 MB RAM, CPU Pentium II 3701 MHz
- :
- ASA Version 9.8(1)
- !
- hostname ciscoasa
- enable password $sha512$5000$GIG1kP6HAI7g6DIFf2dhHw==$owekj/puNR3YFce4j3fQsQ== pbkdf2
- xlate per-session deny tcp any4 any4
- xlate per-session deny tcp any4 any6
- xlate per-session deny tcp any6 any4
- xlate per-session deny tcp any6 any6
- xlate per-session deny udp any4 any4 eq domain
- xlate per-session deny udp any4 any6 eq domain
- xlate per-session deny udp any6 any4 eq domain
- xlate per-session deny udp any6 any6 eq domain
- names
- !
- interface GigabitEthernet0/0
- no nameif
- no security-level
- no ip address
- !
- interface GigabitEthernet0/0.1
- vlan 1
- nameif VLAN1
- security-level 100
- ip address 10.1.1.254 255.255.255.0
- !
- interface GigabitEthernet0/0.10
- vlan 10
- nameif VLAN10
- security-level 100
- ip address 10.10.10.254 255.255.255.0
- !
- interface GigabitEthernet0/0.20
- vlan 20
- nameif VLAN20
- security-level 100
- ip address 20.20.20.254 255.0.0.0
- !
- interface GigabitEthernet0/0.30
- vlan 30
- nameif VLAN30
- security-level 100
- ip address 30.30.30.254 255.0.0.0
- !
- interface GigabitEthernet0/1
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface GigabitEthernet0/2
- nameif OUTSIDE
- security-level 0
- ip address 192.168.122.60 255.255.255.0
- !
- interface GigabitEthernet0/3
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface GigabitEthernet0/4
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface GigabitEthernet0/5
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface GigabitEthernet0/6
- shutdown
- no nameif
- no security-level
- no ip address
- !
- interface Management0/0
- shutdown
- no nameif
- no security-level
- no ip address
- !
- ftp mode passive
- dns domain-lookup OUTSIDE
- dns server-group DefaultDNS
- name-server 8.8.8.8
- same-security-traffic permit intra-interface
- pager lines 23
- mtu VLAN1 1500
- mtu VLAN10 1500
- mtu VLAN20 1500
- mtu VLAN30 1500
- mtu OUTSIDE 1500
- no failover
- no monitor-interface service-module
- icmp unreachable rate-limit 1 burst-size 1
- no asdm history enable
- arp timeout 14400
- no arp permit-nonconnected
- arp rate-limit 8192
- route OUTSIDE 0.0.0.0 0.0.0.0 192.168.122.1 1
- timeout xlate 3:00:00
- timeout pat-xlate 0:00:30
- timeout conn 1:00:00 half-closed 0:10:00 udp 0:02:00 sctp 0:02:00 icmp 0:00:02
- timeout sunrpc 0:10:00 h323 0:05:00 h225 1:00:00 mgcp 0:05:00 mgcp-pat 0:05:00
- timeout sip 0:30:00 sip_media 0:02:00 sip-invite 0:03:00 sip-disconnect 0:02:00
- timeout sip-provisional-media 0:02:00 uauth 0:05:00 absolute
- timeout tcp-proxy-reassembly 0:01:00
- timeout floating-conn 0:00:00
- timeout conn-holddown 0:00:15
- timeout igp stale-route 0:01:10
- user-identity default-domain LOCAL
- aaa authentication login-history
- http server enable
- http 0.0.0.0 0.0.0.0 OUTSIDE
- no snmp-server location
- no snmp-server contact
- crypto ipsec security-association pmtu-aging infinite
- crypto ca trustpoint _SmartCallHome_ServerCA
- no validation-usage
- crl configure
- crypto ca trustpool policy
- auto-import
- crypto ca certificate chain _SmartCallHome_ServerCA
- certificate ca 18dad19e267de8bb4a2158cdcc6b3b4a
- 308204d3 308203bb a0030201 02021018 dad19e26 7de8bb4a 2158cdcc 6b3b4a30
- 0d06092a 864886f7 0d010105 05003081 ca310b30 09060355 04061302 55533117
- 30150603 55040a13 0e566572 69536967 6e2c2049 6e632e31 1f301d06 0355040b
- 13165665 72695369 676e2054 72757374 204e6574 776f726b 313a3038 06035504
- 0b133128 63292032 30303620 56657269 5369676e 2c20496e 632e202d 20466f72
- 20617574 686f7269 7a656420 75736520 6f6e6c79 31453043 06035504 03133c56
- 65726953 69676e20 436c6173 73203320 5075626c 69632050 72696d61 72792043
- 65727469 66696361 74696f6e 20417574 686f7269 7479202d 20473530 1e170d30
- 36313130 38303030 3030305a 170d3336 30373136 32333539 35395a30 81ca310b
- 30090603 55040613 02555331 17301506 0355040a 130e5665 72695369 676e2c20
- 496e632e 311f301d 06035504 0b131656 65726953 69676e20 54727573 74204e65
- 74776f72 6b313a30 38060355 040b1331 28632920 32303036 20566572 69536967
- 6e2c2049 6e632e20 2d20466f 72206175 74686f72 697a6564 20757365 206f6e6c
- 79314530 43060355 0403133c 56657269 5369676e 20436c61 73732033 20507562
- 6c696320 5072696d 61727920 43657274 69666963 6174696f 6e204175 74686f72
- 69747920 2d204735 30820122 300d0609 2a864886 f70d0101 01050003 82010f00
- 3082010a 02820101 00af2408 08297a35 9e600caa e74b3b4e dc7cbc3c 451cbb2b
- e0fe2902 f95708a3 64851527 f5f1adc8 31895d22 e82aaaa6 42b38ff8 b955b7b1
- b74bb3fe 8f7e0757 ecef43db 66621561 cf600da4 d8def8e0 c362083d 5413eb49
- ca595485 26e52b8f 1b9febf5 a191c233 49d84363 6a524bd2 8fe87051 4dd18969
- 7bc770f6 b3dc1274 db7b5d4b 56d396bf 1577a1b0 f4a225f2 af1c9267 18e5f406
- 04ef90b9 e400e4dd 3ab519ff 02baf43c eee08beb 378becf4 d7acf2f6 f03dafdd
- 75913319 1d1c40cb 74241921 93d914fe ac2a52c7 8fd50449 e48d6347 883c6983
- cbfe47bd 2b7e4fc5 95ae0e9d d4d143c0 6773e314 087ee53f 9f73b833 0acf5d3f
- 3487968a ee53e825 15020301 0001a381 b23081af 300f0603 551d1301 01ff0405
- 30030101 ff300e06 03551d0f 0101ff04 04030201 06306d06 082b0601 05050701
- 0c046130 5fa15da0 5b305930 57305516 09696d61 67652f67 69663021 301f3007
- 06052b0e 03021a04 148fe5d3 1a86ac8d 8e6bc3cf 806ad448 182c7b19 2e302516
- 23687474 703a2f2f 6c6f676f 2e766572 69736967 6e2e636f 6d2f7673 6c6f676f
- 2e676966 301d0603 551d0e04 1604147f d365a7c2 ddecbbf0 3009f343 39fa02af
- 33313330 0d06092a 864886f7 0d010105 05000382 01010093 244a305f 62cfd81a
- 982f3dea dc992dbd 77f6a579 2238ecc4 a7a07812 ad620e45 7064c5e7 97662d98
- 097e5faf d6cc2865 f201aa08 1a47def9 f97c925a 0869200d d93e6d6e 3c0d6ed8
- e6069140 18b9f8c1 eddfdb41 aae09620 c9cd6415 3881c994 eea28429 0b136f8e
- db0cdd25 02dba48b 1944d241 7a05694a 584f60ca 7e826a0b 02aa2517 39b5db7f
- e784652a 958abd86 de5e8116 832d10cc defda882 2a6d281f 0d0bc4e5 e71a2619
- e1f4116f 10b595fc e7420532 dbce9d51 5e28b69e 85d35bef a57d4540 728eb70e
- 6b0e06fb 33354871 b89d278b c4655f0d 86769c44 7af6955c f65d3208 33a454b6
- 183f685c f2424a85 3854835f d1e82cf2 ac11d6a8 ed636a
- quit
- telnet timeout 5
- ssh stricthostkeycheck
- ssh timeout 5
- ssh key-exchange group dh-group1-sha1
- console timeout 0
- threat-detection basic-threat
- threat-detection statistics access-list
- no threat-detection statistics tcp-intercept
- dynamic-access-policy-record DfltAccessPolicy
- username cisco password $sha512$5000$EeBQCpWzfgucCAdxlUO3xQ==$mNgonycYUIsVk/8Xp9t6Dw== pbkdf2 privilege 15
- !
- class-map inspection_default
- match default-inspection-traffic
- !
- !
- policy-map type inspect dns preset_dns_map
- parameters
- message-length maximum client auto
- message-length maximum 512
- no tcp-inspection
- policy-map global_policy
- class inspection_default
- inspect ip-options
- inspect netbios
- inspect rtsp
- inspect sunrpc
- inspect tftp
- inspect xdmcp
- inspect dns preset_dns_map
- inspect ftp
- inspect h323 h225
- inspect h323 ras
- inspect rsh
- inspect esmtp
- inspect sqlnet
- inspect sip
- inspect skinny
- inspect icmp
- policy-map type inspect dns migrated_dns_map_2
- parameters
- message-length maximum client auto
- message-length maximum 512
- no tcp-inspection
- policy-map type inspect dns migrated_dns_map_1
- parameters
- message-length maximum client auto
- message-length maximum 512
- no tcp-inspection
- !
- service-policy global_policy global
- prompt hostname context
- no call-home reporting anonymous
- call-home
- profile CiscoTAC-1
- no active
- destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
- destination address email [email protected]
- destination transport-method http
- subscribe-to-alert-group diagnostic
- subscribe-to-alert-group environment
- subscribe-to-alert-group inventory periodic monthly
- subscribe-to-alert-group configuration periodic monthly
- subscribe-to-alert-group telemetry periodic daily
- profile License
- destination address http https://tools.cisco.com/its/service/oddce/services/DDCEService
- destination transport-method http
- Cryptochecksum:e299f59689400bb265edacd1054e09c6
- : end
- no asdm history enable
Add Comment
Please, Sign In to add comment